{"id":212,"date":"2015-09-07T16:50:00","date_gmt":"2015-09-07T16:50:00","guid":{"rendered":"http:\/\/wiki.thomasandsofia.com\/?p=212"},"modified":"2015-09-07T19:07:22","modified_gmt":"2015-09-07T19:07:22","slug":"ccent-5-s01-e20-adv-tcp-ip-subnetting-part-2","status":"publish","type":"post","link":"https:\/\/wiki.thomasandsofia.com\/?p=212","title":{"rendered":"CCENT 5 S01 E20 \u2013 Adv TCP: IP Subnetting, Part 2"},"content":{"rendered":"<div class=\"notice\">\n<p>This article outlines the steps required to break a Class A, B or C network down into multiple Subnets as defined by the number of Hosts required for each subnet.<\/p>\n<p>Several examples are provided below, along with practice exercises (actual answers not provided.)<\/p>\n<p>Use these examples to work on your speed!\u00a0 Goal: 2 &#8211; 3 Minutes per problem.<\/p>\n<\/div>\n<h3>Steps Required to Break a Network into Subnets by the Number of Hosts<\/h3>\n<ol>\n<li>Determine the Number of Hosts and Convert to Binary<\/li>\n<li>Reserve Bits in Subnet Mask and find the Increment<\/li>\n<li>Use Increment to find the Network Ranges<\/li>\n<\/ol>\n<h3>Network Scenario #1: 216.21.5.0 with 30 Hosts Each<\/h3>\n<p>1. Determine Bits required for Hosts<\/p>\n<ul>\n<li>30 = 0001xxxx = 5 Bits (32 Increment)<\/li>\n<\/ul>\n<p>2. Reserve Bits in Subnet Mask and Find Increment<\/p>\n<ul>\n<li>11111111.11111111.1111111.111<strong>00000<\/strong> = 255.255.255.224 (aka \/27)<\/li>\n<li>Increment = -.-.-.11<strong>1<\/strong>00000 = 32<\/li>\n<li>Max Networks = 8<\/li>\n<li>Max Hosts = 2^5 &#8211; 2 = 32 &#8211; 2 = 30<\/li>\n<\/ul>\n<p>3. Calculate the ranges<\/p>\n<ul>\n<li>216.21.5.0 &#8211; 216.21.5.31<\/li>\n<li>216.21.5.32 &#8211; 216.21.5.63<\/li>\n<li>216.21.5.64 &#8211; 216.21.5.95<\/li>\n<li>216.21.5.96 &#8211; 216.21.5.127<\/li>\n<li>216.21.5.128 &#8211; 216.21.5.159<\/li>\n<li>216.21.5.160 &#8211; 216.21.5.191<\/li>\n<li>216.21.5.192 &#8211; 216.21.5.223<\/li>\n<li>216.21.5.224 &#8211; 216.21.5.255<\/li>\n<\/ul>\n<h3>Network Scenario #2: 195.5.20.0 with 50 Hosts Each<\/h3>\n<p>1. Convert Hosts to Bits<\/p>\n<ul>\n<li>50 = 001xxxxx = 6 Bits<\/li>\n<li>Increment = 2^6 = 64<\/li>\n<\/ul>\n<p>2. Reserve Bits and find Increment<\/p>\n<ul>\n<li>Save the Hosts -.-.-.11<strong>000000<\/strong><\/li>\n<li>Find the Increment -.-.-.1<strong>1<\/strong>000000 = 255.255.255.192 = \/26<\/li>\n<li>Increment = 64<\/li>\n<li>Max Networks = 2^2 = 4<\/li>\n<li>Hosts \/ Subnet = 2^6 &#8211; 2 = 64 &#8211; 2 = 62<\/li>\n<\/ul>\n<p>3. Calculate Ranges<\/p>\n<ul>\n<li>195.5.20.0 &#8211; 195.5.20.63<\/li>\n<li>195.5.20.64 &#8211; 195.5.20.127<\/li>\n<li>195.5.20.128 &#8211; 195.5.20.191<\/li>\n<li>195.5.20.192 &#8211; 195.5.20.255<\/li>\n<\/ul>\n<h3>Network Scenario #3: 150.5.0.0 with 500 Hosts Each<\/h3>\n<ol>\n<li>Convert Hosts to Binary<\/li>\n<\/ol>\n<ul>\n<li>500 = 00000001.xxxxxxxx = 9 Bits<\/li>\n<li>Increment = 2^9 = 512<\/li>\n<\/ul>\n<p>2. Reserve Bits and determine Mask<\/p>\n<ul>\n<li>-.-.1111111<strong>0.00000000<\/strong> = 255.255.254.0 = \/23<\/li>\n<li>Increment = -.-.111111<strong>1<\/strong>0.00000000 = 2 in 3rd Octet<\/li>\n<li>Max Networks = 2^7 = 128<\/li>\n<li>Host \/ Subnet = 2^9 &#8211; 2 = 512 &#8211; 2 = 510 Hosts<\/li>\n<\/ul>\n<p>3. Calculate Ranges<\/p>\n<ul>\n<li>150.5.0.0 &#8211; 150.5.1.255<\/li>\n<li>150.5.2.0 &#8211; 150.5.3.255<\/li>\n<li>150.5.4.0 &#8211; 150.5.5.255<\/li>\n<li>150.5.6.0 &#8211; 150.5.7.255<\/li>\n<\/ul>\n<h3>Network Scenario #4: 12.0.0.0 with 100 Hosts Each<\/h3>\n<ol>\n<li>Convert Hosts to Binary<\/li>\n<\/ol>\n<ul>\n<li>100 = 01xxxxxx =\u00a0 7 Bits<\/li>\n<li>Increment = 128<\/li>\n<\/ul>\n<p>2. Reserve Bits<\/p>\n<ul>\n<li>-.11111111.11111111.1<strong>0000000<\/strong> = 255.255.255.128\u00a0 \/25<\/li>\n<li>-.11111111.11111111.<strong>1<\/strong>0000000 = 128 Increment<\/li>\n<li>Max Networks = 2^17 = 131,072<\/li>\n<li>Hosts \/ Subnet = 2^7 &#8211; 2 = 128 &#8211; 2 = 126<\/li>\n<\/ul>\n<p>3. Calculate Ranges<\/p>\n<ul>\n<li>12.0.0.0 &#8211; 12.0.0.127<\/li>\n<li>12.0.0.128 &#8211; 12.0.0.255<\/li>\n<li>12.0.1.0 &#8211; 12.0.1.127<\/li>\n<li>12.0.1.128 &#8211; 12.0.1.255<\/li>\n<li>12.0.2.0 &#8211; 12.0.2.127<\/li>\n<\/ul>\n<h3>On My Own<\/h3>\n<h4>200.1.1.0 with 40 Hosts \/ Network<\/h4>\n<p>Class C<\/p>\n<p>40 = 001xxxxx = 6 Bits = 64 Increment<\/p>\n<p>Networks = -.-.-.11000000 = 4 Networks (2 ^ 2bits)<\/p>\n<ul>\n<li>200.1.1.0 &#8211; .63<\/li>\n<li>200.1.1.64 &#8211; .127<\/li>\n<li>200.1.1.128 &#8211; .191<\/li>\n<li>200.1.1.192 &#8211; .255<\/li>\n<\/ul>\n<h4>199.9.10.0 with 12 Hosts \/ Network<\/h4>\n<p>Class C<\/p>\n<p>12 = 00001xxx = 4 bits = 16 Increment<\/p>\n<p>Mask = -.-.-.11111000 = 255.255.255.248\u00a0 \/ 29<\/p>\n<ul>\n<li>199.9.10.0 &#8211; 199.9.10.15<\/li>\n<li>199.9.10.16 &#8211; 199.9.10.31<\/li>\n<li>199.9.10.32 &#8211; 199.9.10.47<\/li>\n<li>199.9.10.48 &#8211; 199.9.10.63<\/li>\n<li>199.9.10.64 &#8211; 199.9.10.79<\/li>\n<\/ul>\n<h4>170.50.0.0 with 1000 Hosts \/ Network<\/h4>\n<p>Class B<\/p>\n<p>1000 = 0000001x.xxxxxxxx = 10 Bits = 1024 Increment = 1022 Hosts\/Network<\/p>\n<p>Mask -.-.11111<strong>1<\/strong>00.00000000 = 255.255.252.0 = \/14<\/p>\n<ul>\n<li>170.50.0.0 &#8211; 170.50.3.255<\/li>\n<li>170.50.4.0 &#8211; 170.50.7.255<\/li>\n<li>170.50.8.0 &#8211; 170.50.11.255<\/li>\n<li>170.50.12.0 &#8211; 170.50.15.255<\/li>\n<\/ul>\n<h4>12.0.0.0 with 100 Hosts \/ Network<\/h4>\n<p>Class A<\/p>\n<p>100 = 01xxxxxx = 7 Bits = 128 Increment<\/p>\n<p>Mask = 255.255.255.128<\/p>\n<p>Networks = 2^17<\/p>\n<ul>\n<li>12.0.0.0 &#8211; .127<\/li>\n<li>12.0.0.128 &#8211; 255<\/li>\n<li>12.0.1.0 &#8211; 127<\/li>\n<li>12.0.1.128 &#8211; 255<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This article outlines the steps required to break a Class A, B or C network down into multiple Subnets as defined by the number of Hosts required for each subnet. Several examples are provided below, along with practice exercises (actual answers not provided.) Use these examples to work on your speed!\u00a0 Goal: 2 &#8211; 3 ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/wiki.thomasandsofia.com\/?p=212\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,2,11,10],"tags":[],"class_list":["post-212","post","type-post","status-publish","format-standard","hentry","category-ccent","category-networking","category-subnets","category-tcpip"],"_links":{"self":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=212"}],"version-history":[{"count":5,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/212\/revisions"}],"predecessor-version":[{"id":218,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/212\/revisions\/218"}],"wp:attachment":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}